CVE-2026-28519 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 17, 2026
arduino-TuyaOpen - Buffer Overflow
Overview
arduino-TuyaOpen < 1.2.1 contains a heap-based buffer overflow caused by malicious DNS responses in the DnsServer component, letting attackers on the same LAN execute arbitrary code, exploit requires LAN DNS server control.
Severity & Score
Impact
Attackers controlling LAN DNS can execute arbitrary code on affected embedded devices, leading to full device compromise.
Mitigation
Update to version 1.2.1 or later.
References
Social Media Activity(1 post)
š CVE-2026-28519 - High (8.8) arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap ... š https://www.thehackerwire.com/vulnerability/CVE-2026-28519/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28519
- Severity
- High
- CVSS Score
- 8.8
- Type
- buffer_overflow
- Status
- confirmed
- EPSS
- 1.5%
- Social Posts
- 1
CWE
- CWE-122
CVSS Metrics
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H